07320nam 22008655 450 99646570520331620200706235627.01-280-39009-397866135680143-642-16576-110.1007/978-3-642-16576-4(CKB)2550000000019906(SSID)ssj0000446326(PQKBManifestationID)11293850(PQKBTitleCode)TC0000446326(PQKBWorkID)10491958(PQKB)10789184(DE-He213)978-3-642-16576-4(MiAaPQ)EBC3066063(PPN)149029810(EXLCZ)99255000000001990620101030d2010 u| 0engurnn#008mamaatxtccrAutonomic and Trusted Computing[electronic resource] 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings /edited by Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XVII, 328 p. 112 illus.)Programming and Software Engineering ;6407Bibliographic Level Mode of Issuance: Monograph3-642-16575-3 Includes bibliographical references and index.Autonomic and Organic Computing -- Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras -- A Formal Framework for Compositional Verification of Organic Computing Systems -- On-Line Adaptive Algorithms in Autonomic Restart Control -- Designing Self-healing in Automotive Systems -- Trustworthy Organic Computing Systems: Challenges and Perspectives -- AC/OC Network and Protocol -- Adaptive Control of Sensor Networks -- Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service -- Trust Models and Application -- Effects of Displaying Trust Information on Mobile Application Usage -- Context Based Trust Normalization in Service-Oriented Environments -- A Framework for Trust Enabled Software Asset Retrieval -- Opportunistic Trust Based P2P Services Framework for Disconnected MANETs -- A Risk-Aware Resource Service Decision Strategy for Global Computing -- Trustworthy Computing -- Message Race Detection for Web Services by an SMT-Based Analysis -- A User-Oriented Approach to Assessing Web Service Trustworthiness -- Improving the Trustworthiness of Service QoS Information in Service-Based Systems -- Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software -- The Testing Method for Interface Customized Component -- Trust-Related Security -- A New Monitor Model for Enhancing Trust-Based Systems -- Design and Analysis of “Flexible” k-out-of-n Signatures -- A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints -- Invited Session -- Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture -- Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace -- On Alleviating Reader Collisions Towards High Efficient RFID Systems.Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010.Programming and Software Engineering ;6407Computer securitySoftware engineeringComputer communication systemsData encryption (Computer science)Application softwareManagement information systemsComputer scienceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer security.Software engineering.Computer communication systems.Data encryption (Computer science).Application software.Management information systems.Computer science.Systems and Data Security.Software Engineering.Computer Communication Networks.Cryptology.Information Systems Applications (incl. Internet).Management of Computing and Information Systems.005.8Xie Bingedthttp://id.loc.gov/vocabulary/relators/edtBranke Juergenedthttp://id.loc.gov/vocabulary/relators/edtSadjadi S. Masoudedthttp://id.loc.gov/vocabulary/relators/edtZhang Daqingedthttp://id.loc.gov/vocabulary/relators/edtZhou Xingsheedthttp://id.loc.gov/vocabulary/relators/edtATC (Conference)BOOK996465705203316Autonomic and Trusted Computing773129UNISA02052nam2 22003373i 450 TO0E04601320251003044414.0m.mo 3.t. 6.m- (d(a (3) 1779 (R)feiV. 220070328d1779 ||||0itac50 baitaitz01i xxxe z01nz01ncRDAcarrierˆ2: ‰Tomo secondo, che principia dalla domenica di settuagesima fino alla feria 3. dopo PasquaIn Napolinella stamperia di Vincenzo Orsinoa spese di Gaetano Castellano1779VIII, 372 pNel tit. il numero 3 è espresso: IIISegn.: a⁴ A-2Y⁴ 2Z⁶.v. 2. - Sul frontespizio timbro di possesso (Ex Libris Domenico Demarco)IT-BN0095 , DEMARCO FONDO RARI C 47001TO0E0460042001 ˆLa ‰luce evangelica irradiata nelle menti de' fedeli, che contiene molte ponderazioni sopra gli Evangelj ... Opera del padre d. Ludovico Sabatino ... divisa in tomi sei, ... Tomo primo [-sesto]2ITNapoliTO0L002386Sabatino, LodovicoRMSV0527730701743095Sabatino, LudovicoBA1V000283Sabatino, LodovicoITIT-00000020070328IT-BN0095 IT-SA0113 IT-CE0014 IT-NA0074 IT-AV0003 IT-BN0064 IT-NA0070 IT-CE0012 IT-CE0009 IT-NA0189 IT-AV0004 IT-BN0116 IT-NA0065 TO0E046013Biblioteca Centralizzata di Ateneo1 esemplare, v. 1-2;5 01DEMARCO FONDO RARI C 47 01 0000135155 VMA (0002 v. 2. - Sul frontespizio timbro di possesso (Ex Libris Domenico Demarco)B 2024070920240709 01 15 24 91 AR BP BU CC CM DP DV GA PPTomo secondo, che principia dalla domenica di settuagesima fino alla feria 3. dopo Pasqua4169934UNISANNIO